Sciweavers

1569 search results - page 264 / 314
» Using active networks technology for dynamic QoS
Sort
View
WEBI
2009
Springer
15 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
HPDC
1998
IEEE
15 years 2 months ago
Personal Tele-Immersion Devices
The Electronic Visualization Laboratory (EVL) at the University of Illinois at Chicago (UIC) has partnered with dozens of computational scientists and engineers to create visualiz...
Thomas A. DeFanti, Daniel J. Sandin, Gregory Dawe,...
CHI
1992
ACM
15 years 1 months ago
Portholes: Supporting Awareness in a Distributed Work Group
We are investigating ways in which media space technologies can support distributed work groups through access to information that supports general awareness. Awareness involves k...
Paul Dourish, Sara A. Bly
ACMICEC
2008
ACM
270views ECommerce» more  ACMICEC 2008»
14 years 11 months ago
Adaptive strategies for predicting bidding prices in supply chain management
Supply Chain Management (SCM) involves a number of interrelated activities from negotiating with suppliers to competing for customer orders and scheduling the manufacturing proces...
Yevgeniya Kovalchuk, Maria Fasli
GI
2004
Springer
15 years 3 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner